The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate its telephone network is a _____.Select one:a. Phone hackerb. Hacktivistc. commh@ck3rd. phreaker
Phreaker is defined as the unauthorized attack on authorized communication system for stealing and manipulation phone networks.
Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
Other options are incorrect because phone hacking is attacking phone device, commh@ck3r is also hacking source and hacktivist hacks system to impact social and political field.